Proceedings DARPA Information Survivability Conference and Exposition
DOI: 10.1109/discex.2003.1194875
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion tolerance via network layer controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…• Algorithm-driven [O'Brien et al, 2003, Verissimo et al, 2006, Zhang et al, 2005, Sliti et al, 2009 : these systems employ algorithms such as the voting algorithm, CHAPTER 2. ATTACK TOLERANCE: CHALLENGES & DIRECTIONS threshold cryptography, and fragmentation redundancy scattering (FRS) to harden their resilience.…”
Section: Attack Tolerance Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…• Algorithm-driven [O'Brien et al, 2003, Verissimo et al, 2006, Zhang et al, 2005, Sliti et al, 2009 : these systems employ algorithms such as the voting algorithm, CHAPTER 2. ATTACK TOLERANCE: CHALLENGES & DIRECTIONS threshold cryptography, and fragmentation redundancy scattering (FRS) to harden their resilience.…”
Section: Attack Tolerance Techniquesmentioning
confidence: 99%
“…• Hybrid [Sousa et al, 2007a]: these systems combine different architectures mentioned above. [Wang and Upppalli, 2003, Chen et al, 2009, O'Brien et al, 2003 [ Stroud et al, 2004] Diversity [Wang and Upppalli, 2003, Chen et al, 2009, O'Brien et al, 2003] [Lala, 2003] FRS [Stroud et al, 2004, Zhang et al, 2005 Threshold cryptography [Ganger et al, 2001,Weinstein andLepanto, 2003] [ Lala, 2003] Recovery [Knight et al, 2001, Wang and Upppalli, 2003, Chen et al, 2009 [ Aung et al, 2005, Arsenault et al, 2007, Sousa et al, 2008, Reiser and Kapitza, 2007 Voting Upppalli, 2003, Valdes et al, 2002] [ Partha et al, 2006] Table 2.1 depicts the mapping between the attacks and the architectures. This study shows firstly that these architectures ensure tolerance to attacks for conventional distributed systems.…”
Section: Attack Tolerance Techniquesmentioning
confidence: 99%